Since this idiocy is in plain text, anyone want to collaborate on a sniffer that will replace the names of books with "Eff you, Adobe! Shame on you for Spying on your Customers!"?
And of course that will kill switch it as soon as the bastards move to encrypt it...

avavictoriaa writes: The cherry grew originally in the temperate climates of Europe and Asia. It’s likely that prehistoric peoples ate wild cherries plentifully, well before humans learned how to farm and settle down. There is even evidence that Neolithic peoples stored and fermented their cherry juice, creating wine before people knew how to extract it from grapes. The cherry reached Italy from the Black Sea, where the Romans embraced it heartily. They took it with them to Britain when they conquered the area, grouping them with plums and grapes at the tables of rich imperials.Link to Original Source

An anonymous reader writes: After the success of Moto G Motorola will be hosting a release event in London this May to introduce a brand new merchandise, and the internet has gone straight into a overdrive estimating that the gadget will be the firm’s newest cell phone the Moto E.Link to Original Source

In mid-January, the Bureau for Private Postsecondary Education (BPPE) sent cease and desist letters to Hackbright Academy, Hack Reactor, App Academy, Zipfian Academy, and others. General Assembly confirmed that it began working on this issue several months ago in order to achieve compliance with BPPE.

BPPE, a unit in the California Department of Consumer Affairs, is arguing that the bootcamps fall under its jurisdiction and are subject to regulation. BPPE is charged with licensing and regulating postsecondary education in California, including academic as well as vocational training programs. It was created in 2010 by the California Private Postsecondary Education Act of 2009, a bill aimed at providing greater oversight of the more than 1,500 postsecondary schools operating in the state.

These bootcamps have not yet been approved by the BPPE and are therefore being classified as unlicensed postsecondary educational institutions that must seek compliance or be forcibly shut down.

AdamnSelene writes: Forbes reports on a National Republican Congressional Committee sanctioned campaign worthy of the NSA: Fake Candidate Websites that use identical or similar pictures and color schemes to solicit donations to defeat the Democratic candidate. The Tampa Bay Times reports that the NRCC initially refused to refund the contribution from a Tampa Bay doctor who caught onto the scam, and he had to contact his credit card company to challenge the charges. The National Journal reports that the NRCC-sponsored effort may run afoul of Federal Election Commission regulations, though it expects that the bipartisan FEC will be toothless when it comes to enforcement. However, I have to wonder whether this is finally a good enough reason to use the DMCA and file take-down notices against the faux websites. Perhaps the candidates could solve this themselves, and get a judgement for copyright infringement so absurdly large that it puts the NRCC out of business?

Randall O'Reilly , a professor of cognitive neuroscience at the University of Colorado Boulder, has put the second edition of his textbook Computational Neuroscience online. I think it would be an excellent resource for you.

An anonymous reader writes: In a live chat hosted by the The Guardian, Edward Snowden has clarified that the NSA does not simply have access to metadata, as has been the media rhetoric, and that large volumes of data relating to US citizens is frequently ingested.

Answering one question, he wrote:

If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time — and can be extended further with waivers rather than warrants.

Answering another:

US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection — policy is a one-way ratchet that only loosens) and one very weak technical protection — a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border.

AdamnSelene writes: The daughter of Mark Frauenfelder, a founder of the website Boing Boing, was 'shamed' and 'humiliated' by a LAX Transportation Security Agency (TSA) officer who told her to 'cover up'. Frauenfelder detailed the story of his daughter’s experience with the TSA yesterday evening. The TSA is investigating the incident.

AdamnSelene writes: After being caught spying on people across Europe and Australia with its Wi-Fi-slurping Street View cars, Google had told angry regulators that it would delete the ill-gotten data. Google broke its promise.Link to Original Source

An anonymous reader writes: The report titled “Bitcoin Virtual Currency: Unique Features Present Distinct Challenges for Deterring Illicit Activity,” (.pdf) was published April 24 and is marked For Official Use Only (not actually classified), but was leaked to the internet on Wednesday.

In the document, the FBI notes that because Bitcoin combines cryptography and a peer-to-peer architecture to avoid a central authority, contrary to how digital currencies such as eGold and WebMoney operated, law enforcement agencies have more difficulty identifying suspicious users and obtaining transaction records.Link to Original Source

TheGift73 writes: "This week yet another court order was handed down in Europe with the aim of censoring The Pirate Bay. The ruling forbids the Dutch Pirate Party from not only running a direct proxy, but also telling people how to circumvent an earlier court ordered blockade. However, according to Pirate Party founder Rick Falkvinge, the judge in the case has a history of corruption relating to another file-sharing case he presided over in the Netherlands.

The Court of The Hague in the Netherlands has been particularly busy this work with Pirate Bay-related cases."Link to Original Source

trawg writes: "As the release draws closer, Diablo 3 game director Jay Wilson from Blizzard has been working hard to keep the community updated. On a press trip to Australia last week, Jay answered a wide range of questions in this video interview (transcript provided) on topics such as PvP, patch releases, game difficulty, and the potential for D1 or D2 being re-released in HD form. He also touches on the subject of a Linux release of the game: '... I don’t think that it would be outrageous, but I think that we’d have to see that there’d be a demand for it. And then we’d have to see that that demand would be worth the time we take away from the other things that we could do.' So it sounds unlikely in the short term, but there's a glimmer of hope for the future."Link to Original Source